RSN authenticator: Add more debug print details on EAPOL-Key RX
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
555ff857dd
commit
dc5bad48af
1 changed files with 12 additions and 3 deletions
|
@ -889,12 +889,15 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
||||||
|
|
||||||
if (wpa_auth == NULL || !wpa_auth->conf.wpa || sm == NULL)
|
if (wpa_auth == NULL || !wpa_auth->conf.wpa || sm == NULL)
|
||||||
return;
|
return;
|
||||||
|
wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len);
|
||||||
|
|
||||||
mic_len = wpa_mic_len(sm->wpa_key_mgmt);
|
mic_len = wpa_mic_len(sm->wpa_key_mgmt);
|
||||||
keyhdrlen = sizeof(*key) + mic_len + 2;
|
keyhdrlen = sizeof(*key) + mic_len + 2;
|
||||||
|
|
||||||
if (data_len < sizeof(*hdr) + keyhdrlen)
|
if (data_len < sizeof(*hdr) + keyhdrlen) {
|
||||||
|
wpa_printf(MSG_DEBUG, "WPA: Ignore too short EAPOL-Key frame");
|
||||||
return;
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
hdr = (struct ieee802_1x_hdr *) data;
|
hdr = (struct ieee802_1x_hdr *) data;
|
||||||
key = (struct wpa_eapol_key *) (hdr + 1);
|
key = (struct wpa_eapol_key *) (hdr + 1);
|
||||||
|
@ -903,8 +906,14 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
|
||||||
key_data = mic + mic_len + 2;
|
key_data = mic + mic_len + 2;
|
||||||
key_data_length = WPA_GET_BE16(mic + mic_len);
|
key_data_length = WPA_GET_BE16(mic + mic_len);
|
||||||
wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
|
wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
|
||||||
" key_info=0x%x type=%u key_data_length=%u",
|
" key_info=0x%x type=%u mic_len=%u key_data_length=%u",
|
||||||
MAC2STR(sm->addr), key_info, key->type, key_data_length);
|
MAC2STR(sm->addr), key_info, key->type,
|
||||||
|
(unsigned int) mic_len, key_data_length);
|
||||||
|
wpa_hexdump(MSG_MSGDUMP,
|
||||||
|
"WPA: EAPOL-Key header (ending before Key MIC)",
|
||||||
|
key, sizeof(*key));
|
||||||
|
wpa_hexdump(MSG_MSGDUMP, "WPA: EAPOL-Key Key MIC",
|
||||||
|
mic, mic_len);
|
||||||
if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) {
|
if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) {
|
||||||
wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
|
wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
|
||||||
"key_data overflow (%d > %lu)",
|
"key_data overflow (%d > %lu)",
|
||||||
|
|
Loading…
Reference in a new issue